Security Firm Identifies Generative AI 'Vishing' Attack

A new report from Ontinue's Cyber Defense Center has identified a complex, multi-stage cyber attack that leveraged social engineering, remote access tools, and signed binaries to infiltrate and persist within a target network.

The campaign began with a vishing (voice phishing) attempt, where the threat actor exploited Microsoft Teams' external messaging capabilities to deliver a malicious PowerShell payload. After social engineering the target into running the script, the actor used Microsoft Quick Assist to gain remote access to a targeted machine.

Once inside the network, the attacker deployed a signed TeamViewer binary alongside a malicious DLL named "TV.dll," which was sideloaded to execute second-stage malware. The use of signed binaries allowed the threat actor to evade many endpoint detection and response (EDR) solutions that trust such files by default.

The second stage involved a JavaScript-based backdoor (index.js) executed via a renamed Node.js binary (hcmd.exe). This backdoor enabled command-and-control capabilities, using Socket.IO to allow remote attackers to issue system-level commands.

The attacker set up persistence by creating a startup shortcut that launched the malicious TeamViewer file every time the system rebooted. They also used Windows' Background Intelligent Transfer Service (BITS) to quietly move data and stage malware for up to 90 days.

To stay hidden, the attacker used advanced evasion techniques such as process hollowing, API hooking, and checks for virtual machines or debugging tools. Functions like IsDebuggerPresent and IsProcessorFeaturePresent were used to detect if the malware was running in a sandbox or under analysis.

The attacker also ran system scans using Windows Management Instrumentation (WMI) to collect details about the machine and security software. For lateral movement, they used psexec.exe, and they stole saved login credentials from web browsers.

While it's unclear who the group responsible is, Ontinue noted that the tactics used closely resemble those of Storm-1811, a threat actor previously documented by Microsoft. Known for abusing Quick Assist and Microsoft Teams in social engineering campaigns, Storm-1811 has been linked to ransomware operations and other post-exploitation toolkits.

The use of vishing techniques shows how attackers are increasing their use of generative AI tools in attacks — in this case the use of AI-generated voices. It also demonstrates how emerging tools are evolving and bringing complexity to attacks. Commenting on the new report by Ontinue, Nicole Carignan, senior vice president at security firm Darktrace, said that enterprise IT must take full responsibility for keeping its data and users safe.

"As sophistication of phishing and vishing attacks continue to grow, organizations cannot rely on employees to be the last line of defense against these attacks," said Carignan. "Instead, organizations must use machine learning-powered tools that can understand how their employees interact with their inboxes and build a profile of what activity is normal for users, including their relationships, tone and sentiment, content, when and how they follow or share links, etc. Only then can they accurately recognize suspicious activity that may indicate a phishing or vishing attack, or business e-mail compromise (BEC)."

For more information, read the full report here.

About the Author

Chris Paoli (@ChrisPaoli5) is the associate editor for Converge360.

Featured

  • large group of college students sitting on an academic quad

    Student Readiness: Learning to Learn

    Melissa Loble, Instructure's chief academic officer, recommends a focus on 'readiness' as a broader concept as we try to understand how to build meaningful education experiences that can form a bridge from the university to the workplace. Here, we ask Loble what readiness is and how to offer students the ability to 'learn to learn'.

  • abstract illustration of artificial intelligence

    CSU Shares AI Learnings in Systemwide Survey

    In a systemwide survey of more than 94,000 faculty, staff, and students, California State University recently documented widespread AI use across its 22 campuses.

  • data figures moving across a network

    Addressing the Cyber Skills Gap: Retention & Recruitment Secrets from Higher Education

    Institutions are working to ensure the retention and recruitment of top cyber talent by continually investing in professional development, fostering collaborative work environments, and equipping teams with the latest tools available to protect and defend against threats.

  • Abstract speed motion blur in vibrant colors

    3 Ed Tech Shifts that Will Define 2026

    The digital learning landscape is entering a new phase defined by rapid advances in artificial intelligence, rising expectations for the student experience, and increasing pressure to demonstrate quality and accountability in online education.